• Title/Summary/Keyword: probability of Internet use

Search Result 101, Processing Time 0.029 seconds

Network based Anomaly Intrusion Detection using Bayesian Network Techniques (네트워크 서비스별 이상 탐지를 위한 베이지안 네트워크 기법의 정상 행위 프로파일링)

  • Cha ByungRae;Park KyoungWoo;Seo JaeHyun
    • Journal of Internet Computing and Services
    • /
    • v.6 no.1
    • /
    • pp.27-38
    • /
    • 2005
  • Recently, the rapidly development of computing environments and the spread of Internet make possible to obtain and use of information easily. Immediately, by opposition function the Hacker's unlawful intrusion and threats rise for network environments as time goes on. Specially, the internet consists of Unix and TCP/IP had many vulnerability. the security techniques of authentication and access controls cannot adequate to solve security problem, thus IDS developed with 2nd defence line. In this paper, intrusion detection method using Bayesian Networks estimated probability values of behavior contexts based on Bayes theory. The contexts of behaviors or events represents Bayesian Networks of graphic types. We profiled concisely normal behaviors using behavior context. And this method be able to detect new intrusions or modificated intrusions. We had simulation using DARPA 2000 Intrusion Data.

  • PDF

Analysis of Feature Variables for Breast Cancer Diagnosis

  • Jung, Yong Gyu;Kim, Jang Il;Sihn, Sung Chul;Heo, Jun
    • International journal of advanced smart convergence
    • /
    • v.2 no.2
    • /
    • pp.36-39
    • /
    • 2013
  • It is becoming more important as the growing of health information and increasing in cancer patients diagnose over the time gradually. Among the various types of cancer, we focuses on breast cancer diagnosis. The accuracy of breast cancer diagnosis is increasing when the diagnosis is based on evidence and statistics. To do this we use the weka data mining tools and analysis algorithms significantly associated with the decision tree uses rules. In addition, the data pre-processing and cross-validation are used to increase the reliability of the results. The number and cause of the disease becomes important to increase evidence-based medical doctors. As the evidence-based medical, the data obtained from patients in the past through the disease by calculating the probability for future patients to diagnose and predict disease and treatment plan. It can be found by improving the survival rate plays an important role.

Intrusion Detection on IoT Services using Event Network Correlation (이벤트 네트워크 상관분석을 이용한 IoT 서비스에서의 침입탐지)

  • Park, Boseok;Kim, Sangwook
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.1
    • /
    • pp.24-30
    • /
    • 2020
  • As the number of internet-connected appliances and the variety of IoT services are rapidly increasing, it is hard to protect IT assets with traditional network security techniques. Most traditional network log analysis systems use rule based mechanisms to reduce the raw logs. But using predefined rules can't detect new attack patterns. So, there is a need for a mechanism to reduce congested raw logs and detect new attack patterns. This paper suggests enterprise security management for IoT services using graph and network measures. We model an event network based on a graph of interconnected logs between network devices and IoT gateways. And we suggest a network clustering algorithm that estimates the attack probability of log clusters and detects new attack patterns.

Performance of Seamless Handoff Scheme with Fast Moving Detection

  • Kim Dong Ok;Yoon Hong;Yoon Chong Hoo
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.588-591
    • /
    • 2004
  • This paper describes a new approach to Internet host mobility. We argue that local mobility, the performance of existing mobile host protocol can be significantly improved. It proposes Fast Moving Detection scheme that based on neighbor AP channel information and moving detection table. And, it composes Local Area Clustering Path (LACP) domain that collected in AP's channel information and MN interface information. It stored the roaming table to include channel information and moving detection. Those which use the proposal scheme will need to put LACP information into the beacon or probe frame. Each AP uses scheme to inform available channel information to MN. From the simulation result, we show that the proposed scheme is advantageous over the legacy schemes in terms of the burst blocking probability and the link utilization.

  • PDF

The Study for Improvement Performance on Priority Multi-Buffer Scheme in Wireless LAN (무선 랜에서 우선순위를 할당한 다중 버퍼 사용에 따른 성능 향상에 관한 연구)

  • Kim, Dong-Ok
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.3 no.2
    • /
    • pp.42-50
    • /
    • 2004
  • This paper describes a new approach to Internet host mobility. We argue that local mobility, the performance of existing mobile host protocol can be significantly improved. It proposes Fast Moving Detection schemethat based on neighbor AP channel information and moving detection table. And, it composes Local Area Clustering Path (LACP) domain that collected in AP's channel information and MN interface information. It stored the roaming table to include channel information and moving detection. Those which use the proposal scheme will need to put LACP information into the beacon or probe frame. Each AP uses scheme to inform available channel information to MN. From the simulation result, we show that the proposed scheme is advantageous over the legacy schemes in terms of theburst blocking probability and the link utilization.

  • PDF

Factors Affecting the Accuracy of Internet Survey (인터넷 여론조사의 정확도 관련요인)

  • Cho, Sung-Kyum;Joo, Young-Soo;Cho, Eun-Hee
    • Survey Research
    • /
    • v.6 no.2
    • /
    • pp.51-74
    • /
    • 2005
  • The internet survey methods have been more and more widely used as the coverage of the fixed-line telephone is being reduced due to the diffusion of mobile phone. So, there is a need to know the accuracy of this new survey method. This study aims to estimate the accuracy of the internet survey method and identify the factors affecting the accuracy of this method, For this purpose, we analyzed the election poll data during the 17th general election period. These data include fixed-line telephone survey data, internet survey data, mobile phone survey data and the election voting data. The analysis shows that the prediction errors of the internet survey were a little more than those of the telephone or mobile phone survey. But the differences are not significant. It follows from this result that we can use the internet survey method in social survey context. This study also found that the respondent's willingness to participate in the survey, the probability of being at home during survey and the respondent's educational level were affecting the accuracy of the internet survey. Further studies to develop weighting method with these factors are needed.

  • PDF

Analysis of TCP NewReno using rapid loss detection (빠른 손실 감지를 이용한 TCP NewReno 분석)

  • Kim Dong min;Han Je chan;Kim Seog gyu;Leem Cha sik;Lee Jai yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.3B
    • /
    • pp.130-137
    • /
    • 2005
  • Wireless communication environment is changing rapidly as we use new wireless communication technology such as WiBro to access high speed Internet. As a result, reliable data transmission using TCP is also expected to increase. Since TCP assumes that it is used in wired network, TCP suffers significant performance degradation over wireless network where packet losses are related to non-congestion loss. Especially RTO imposes a great performance degradation of TCP. In this paper, we analyze the loss recovery probabilities based on previous researches, and use simulation results of our algorithm to show that it prevents performance degradation by quickly detecting and recovery losses without RTO during fast recovery.

The Determinants of Ginseng Products Purchase during the Trip in Korea (인삼 제품 구매 선택과 결정 요인 분석)

  • Ho-Jung Yoon;Hyun Sung Cho;Sung Ah Lim
    • Journal of Ginseng Culture
    • /
    • v.5
    • /
    • pp.97-114
    • /
    • 2023
  • Despite numerous studies, research on ginseng in aspect of an economic and business perspective are insufficient. Recently, research to reveal the economic cause of ginseng products purchase is drawing attention. The purpose of this study is to analyze empirically the factors of ginseng products purchase by international consumers from a microeconomic perspective. Using the survey data, we empirically investigate the determinants of ginseng products purchase by international consumers visiting Korea. We use a multinomial logistic model to find the determinants that influence the purchase of ginseng products. This study finds the followings. First, the economic factor is an important determinant of ginseng products purchase. The average daily expenditure has a greater impact on ginseng products purchase than household income does. Even though the average daily expenditure is high, they tend to buy less ginseng products when they prefer other products. Second, demographically, gender and age are also important determinants of ginseng products purchase. It has been found that elderly male consumers are more likely to buy ginseng products. Third, international consumers for leisure purposes have a higher probability of buying ginseng products than tourism consumers for other purposes do. Finally, destination attributes such as security (safety), ease of use of mobile/Internet, and ease of finding directions are also important factors affecting ginseng products purchase. In addition, it is found that the convenience of using the mobile/Internet, the ease of finding directions, and the convenience of shopping increase the probability of buying ginseng products by international consumers. This study is meaningful in that it explored the determinants of ginseng products purchase by analyzing individual consumers' ginseng products choices.

Performance Analysis of the Amplify-and-Forward Scheme under Interference Constraint and Physical Layer Security (물리 계층 보안과 간섭 제약 환경에서 증폭 후 전송 기법의 성능 분석)

  • Pham, Ngoc Son;Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.179-187
    • /
    • 2014
  • The underlay protocol is a cognitive radio method in which secondary or cognitive users use the same frequency without affecting the quality of service (QoS) for the primary users. In addition, because of the broadcast characteristics of the wireless environment, some nodes, which are called eavesdropper nodes, want to illegally receive information that is intended for other communication links. Hence, Physical Layer Security is applied considering the achievable secrecy rate (ASR) to prevent this from happening. In this paper, a performance analysis of the amplify-and-forward scheme under an interference constraint and Physical Layer Security is investigated in the cooperative communication mode. In this model, the relays use an amplify-and- forward method to help transmit signals from a source to a destination. The best relay is chosen using an opportunistic relay selection method, which is based on the end-to-end ASR. The system performance is evaluated in terms of the outage probability of the ASR. The lower and upper bounds of this probability, based on the global statistical channel state information (CSI), are derived in closed form. Our simulation results show that the system performance improves when the distances from the relays to the eavesdropper are larger than the distances from the relays to the destination, and the cognitive network is far enough from the primary user.

Modified Random Early Defection Algorithm for the Dynamic Congestion Control in Routers (라우터에서의 동적인 혼잡 제어를 위한 새로운 큐 관리 알고리즘)

  • Koo, Ja-Hon;Song, Byung-Hun;Chung, Kwang-Sue;Oh, Seoung-Jun
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.517-526
    • /
    • 2001
  • In order to reduce the increasing packet loss rates caused by an exponential increase in network traffic, the IETF(Internet Engineering Task Force) is considering the deployment of active queue management techniques such as RED(Random Early Detection). While active queue management in routers and gateways can potentially reduce total packet loss rates in the Internet, this paper has demonstrated the inherent weakness of current techniques and shows that they are ineffective in preventing high loss rates. The inherent problem with these queue management algorithms is that they all use queue lengths as the indicator of the severity of congestion. In this paper, in order to solve this problem, a new active queue management algorithm called MRED(Modified Random Early Detection) is proposed. MRED computes the packet drop probability based on our heuristic method rather than the simple method used in RED. Using simulation, MRED is shown to perform better than existing queue management schemes. To analyze the performance, we also measure throughput of traffics under the FIFO control, and compared the performance with that of this MRED system.

  • PDF